CVE-2020-16875: Microsoft Exchange Server Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.4)
- CVSS Vector
- CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Sep
- Released
- 2020-09-08
- Last Updated
- 2020-09-08
- EPSS Score
- 86.82% (percentile: 99.4%)
Description
A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.
An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.
The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.
Detection & Weaponization (1 sources)
Maturity: Exploit
- Metasploit modules: Microsoft Exchange Server DlpUtils AddTenantDlpPolicy RCE
Affected Products (4)
Other
Security Updates (4)
Acknowledgments
Steven Seeley (mr_me) of <a href="https://srcincite.io/">Source Incite</a>
Revision History
- 2020-09-08: Information published.
- 2020-09-08: Updated vulnerability description.